. . . . . . "The software can pull text messages, attachments, call logs, address books, calendars, email account settings, photos and other information in a few minutes.Of course, if someone already knows the person's Apple credentials, they could recover the data anyway, but in a slower fashion." . . .